1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
14

Let X and Y be two decision problems. Suppose we know that X reduces to Yin polynomial time. Which of the following statements a

re true?Explain
a. If Y is NP-complete then so is X.
b. If X is NP-complete then so is Y.
c. If Y is NP-complete and Xis in NP then X is NP-complete.
d. If X is NP-complete and Y is in NP then Y is NP-complete.
e. If X is in P, then Y is in P.
f. If Y is in P, then X is in P.
g. X and Y can't both be in NP
Computers and Technology
1 answer:
DerKrebs [107]3 years ago
4 0

Answer:

d. If X is NP - complete and Y is in NP then Y is NP - complete.

This can be inferred

Explanation:

The statement d can be inferred, rest of the statements cannot be inferred. The X is in NP complete and it reduces to Y. Y is in NP and then it is NP complete. The Y is not in NP complete as it cannot reduce to X. The statement d is inferred.

You might be interested in
Why should we apply print preview before printing the document.​
Ghella [55]

to helps them to see how the final printed material will appear. 

7 0
2 years ago
What should you do before you share your information on the Internet? A. Ask a trusted adult to make sure it is safe. B. Check t
lora16 [44]

There are some websites that are trustworthy. For instance just beside the address bar there will be a lock. You can scroll over it with your mouse to see if it states that it is a secure connection.

Virus protection if accountable should also advise whether website is safe or not.

Always scroll down to the bottom of the page and check their security sites, as in McAfee, Norton, Etc.

The answer is D: Read the website thoroughly!!!!

Always be skeptical and reluctant, as technology advances, so do hackers and online criminals. People are far too brave and crazy these days.

Most bank accounts offer some type of an additional account you can use for online transactions. For instance you may have a checking that you have to pay your bills with (keep your bill money, etc in the account not being used online). Then they may offer another type of account, my  bank refers it to an eaccess account, This is where I can use their online app to transfer money, through my bank app, for online purchases only. Therefore if someone has my account information they aren't getting access to my money that is an absolute necessity, just the little online purchase at a time one, that is also FDIC insured and after a dispute you will be reimbursed in due time.

Another option is PayPal, Paypal actually has a cash debit card now that makes life so much easier when paying. Using paypal pay they only have access to a prepaid debit card.

5 0
3 years ago
Given a number count the total number of digits in a number
MrMuchimi

Answer:

round up the log of the number

Explanation:

The ¹⁰log of a number gives you the number of digits if you round it up.

6 0
3 years ago
Famed science fiction writer H. G. Wells once envisioned something to store vast amounts of information. What did he call it?
Fiesta28 [93]
<span>Universal Decimal Classification </span>
5 0
3 years ago
Read 2 more answers
Define a function group-by-nondecreasing, which takes in a stream of numbers and outputs a stream of lists, which overall has th
Debora [2.8K]

Answer:

def group_by_nondecreasing( *args ) :

     num_list = [arg for arg in args]

     sorted_numlist = sorted( num_list )

     list_stream = [ sorted_numlist, sorted_numlist, sorted_numlist ]

     return list_stream

Explanation:

This python function has the ability to accept multiple and varying amount of arguments. the list comprehension shorten the logical for statement to generate a list of numbers, sorts the list in ascending order by default and duplicates the list in another list.

5 0
3 years ago
Other questions:
  • The _________ specifies the station(s) for which the frame is intended. it may be a unique physical address, a group address, or
    5·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • Which of the following statements about the FAFSA process are TRUE?
    6·1 answer
  • Magnetic ram (mram) uses ____ rather than an electrical charge to store data.
    6·1 answer
  • Give 5 uses of software and hardware.
    15·1 answer
  • You may nest while and do-while loops, but you may not nest for loops<br><br><br><br> True False
    10·1 answer
  • A computer has a pipeline with four stages. Each stage takes the same time to do its
    8·1 answer
  • I'm stupid and Idk how to take a pic on a Chromebook so, I want to know how to take a pic on a cromebook.
    11·1 answer
  • Select the four bad password ideas.
    13·2 answers
  • Identify and explain 4 traditional (old ways) marketing approaches used by University uses in reaching
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!